The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Analyzing similarity of access control policies is very important in many application sceneries, for example, conducting similarity analysis to reduce policy scale in cloud services composition, or through similar policies to find cloud services which have same function. Existing methods of policy similarity analysis are mainly based on logical reasoning or Boolean function comparison, which are computationally...
Digital evidences are the important basis in digital forensic. This paper proposed a concrete digital evidence protection method with hierarchical access control mechanisms using cryptographic techniques. It allows judicial policeman to authenticated encrypt the collected digital evidences from being disclosed and modified by potential malicious attackers (including malicious insiders and outsiders)...
Distributed GIS system's data security, especially access control, has become an indispensable function component in the practical application of distributed system. However, current approaches to access control are mostly based on individual user identity; hence they do not scale to distributed systems. In this paper, a new access control mechanism which is the combination of trust and role-based...
In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be...
The access control service has been an important orientation in the security research. In this paper, the essentiality of access control service in the E-Commerce Web was analyzed; the relative technologies were introduced at the same time. And through describing a concrete collaborative e-commerce platform, a detailed description of how to design and implementation of access control systems were...
Recently, a new class of crime scenes has become more prevalent. In a variety of criminal activities technologies are used to maintain records, communication, and commit crimes. For this reason, the challenge to investigative professionals is how to retrieve the digital evidence from storage devices and how to take the suspect to court. Digital evidence is different from physical. When the investigative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.